First published: Tue May 24 2011(Updated: )
Multiple integer overflows in the glob implementation in libc in OpenBSD before 4.9 might allow context-dependent attackers to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | <=4.8 | |
OpenBSD | =2.0 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.3 | |
OpenBSD | =2.4 | |
OpenBSD | =2.5 | |
OpenBSD | =2.6 | |
OpenBSD | =2.7 | |
OpenBSD | =2.8 | |
OpenBSD | =2.9 | |
OpenBSD | =3.0 | |
OpenBSD | =3.1 | |
OpenBSD | =3.2 | |
OpenBSD | =3.3 | |
OpenBSD | =3.4 | |
OpenBSD | =3.5 | |
OpenBSD | =3.6 | |
OpenBSD | =3.7 | |
OpenBSD | =3.8 | |
OpenBSD | =3.9 | |
OpenBSD | =4.0 | |
OpenBSD | =4.1 | |
OpenBSD | =4.2 | |
OpenBSD | =4.3 | |
OpenBSD | =4.4 | |
OpenBSD | =4.5 | |
OpenBSD | =4.6 | |
OpenBSD | =4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-2168 is not explicitly rated, but it involves multiple integer overflows that could allow for unspecified impacts.
To fix CVE-2011-2168, upgrade to OpenBSD version 4.9 or later, which has addressed the issue.
CVE-2011-2168 affects OpenBSD versions up to 4.8 as well as early versions starting from 2.0.
The impact of CVE-2011-2168 may allow attackers to exploit the integer overflow vulnerabilities through crafted strings.
There are no publicly known exploits specifically targeting CVE-2011-2168 at this time.